1. IE Tab Classic:

2. Chrome IE Tab Multi:

The questions is how do these extensions manage to load the fully featured OWA while native Chrome cannot? Is using these extensions as risky as using IE? How are these extensions working?
Journaling on estrip is easy and free. sign up here
But I don't have IE on my machine at all! The thing is I ripped out the browser when I slipstreamed all of the latest security pathes and drivers into my winxp. I just have the "IE engine". Is the "IE engine", by itself insecure? I guess I don't understand the difference between the IE engine and the browser facade that I ripped out. Is the thing I ripped out just cosmetic?
Its no different I believe. It would be whatever IE is on your machine but it would still be executing the IE engine.
So that tab is not protected by Chrome's security features then and has all the holes and flaws that the typical IE would have? Also, which version of IE is it? How do I find out? Is it chrome's implementation of the latest IE? Does that mean running this extension IE is safer than running the real IE (does that make sense?)
It literally just opens an IE browser in a chrome tab. IE can be embedded in any windows app. Firefox has the same extension.